Software House RM1-MP Access control reader
Technical Specification
- Make: Software House
- Model code: RM1-MP
- Series: RM Series
- Reader Type: Card Swipe
- Standalone/ Networkable: Standalone
The RM Magnetic Stripe reader utilizes flexible and versatile card reader technology. The readers support high and low coercivity cards encoded on track 2. The RM Magnetic Stripe reader gives you the option of using cards that have been magnetically encoded for other applications (consult factory for track 1 and 3 applications). The RM Magnetic Stripe reader is available in standard and mullion styles, and is coated for weather resistance.
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control readers |
Model code | RM1-MP |
Series | RM Series |
Reader Type | Card Swipe |
Standalone/ Networkable | Standalone |
LED / Beep | LED / Beep |
Electrical Specifications |
Voltage: 12 V DC Power Consumption: 80 mA |
Physical Specifications |
Dimensions mm: 129.5 x 142.2 x 49.5 Weight g: 588 |
Environmental Specifications | Operating Temp oC: -30 ~ +60 |
Protection | Weather Resistant |
Additional info |
The RM Magnetic Stripe reader utilizes flexible and versatile card reader technology. The readers support high and low coercivity cards encoded on track 2. The RM Magnetic Stripe reader gives you the option of using cards that have been magnetically encoded for other applications (consult factory for track 1 and 3 applications). The RM Magnetic Stripe reader is available in standard and mullion styles, and is coated for weather resistance. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The critical importance of Trusted Execution Environment in access control
The security challenges of data centers
Access and security in the age of hybrid working
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download